{"id":3706,"date":"2025-05-14T07:45:23","date_gmt":"2025-05-14T05:45:23","guid":{"rendered":"https:\/\/enthec.com\/?p=3706"},"modified":"2025-05-14T07:45:23","modified_gmt":"2025-05-14T05:45:23","slug":"cybersecurity-in-hospitals-how-continuous-monitoring-protects-sensitive-patient-data","status":"publish","type":"post","link":"https:\/\/enthec.com\/en\/cybersecurity-in-hospitals-how-continuous-monitoring-protects-sensitive-patient-data\/","title":{"rendered":"Cybersecurity in hospitals: How continuous monitoring protects sensitive patient data"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Medical information is as valuable as it is sensitive. Hospitals and health centers, traditionally focused on caring for people&#8217;s physical and emotional health, today face a new challenge:  <\/span><b>protecting their patients&#8217; sensitive data<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Every medical record, diagnostic report, and treatment stored in a digital system represents critical information. Its exposure, theft, or alteration compromises privacy and can endanger human lives.  <\/span><b>Therefore, cybersecurity in hospitals has become a strategic priority.<\/b><\/p>\n<p>&nbsp;<\/p>\n<h2><b>The risk is real: why are hospitals targeted?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">If you&#8217;ve ever wondered why someone would attack a hospital, the answer is more straightforward:<\/span> <b>medical data is worth a lot on the black market.<\/b><span style=\"font-weight: 400;\">. In addition, health centers often have complex, usually outdated computer systems, which makes them relatively easy targets for cybercriminals.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to data from<\/span> <i><span style=\"font-weight: 400;\">SonicWall&#8217;s Global Threats Report<\/span><\/i> <span style=\"font-weight: 400;\">(2025)<\/span>, <b>the health sector was among the most attacked during the year.<\/b> <span style=\"font-weight: 400;\">95% of ransomware was used in attacks on the industry, and more than 198 million patients were affected in 2024 alone in the United States.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Spain is no stranger to this reality: public and private hospitals have suffered leaks, data hijackings, and service outages that have directly affected healthcare.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These cybersecurity attacks in hospitals not only involve<\/span> <b>economic and reputational losses.<\/b><span style=\"font-weight: 400;\">. On many occasions, they force us to delay operations, refer patients, or go back to using paper, with all the complications that this entails.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>What does it mean to protect a hospital?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">In the current context, cybersecurity can no longer be understood as a set of isolated measures implemented once and forgotten. Attacks evolve, techniques change, and  <\/span><b>exposure to threats is constant<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For this reason, more and more healthcare organizations are adopting models such as CTEM (Continuous Threat Exposure Management), or in Spanish, Continuous Threat Exposure Management. This strategy is based on  <\/span><b>actively and permanently monitoring all possible attack vectors: <\/b><span style=\"font-weight: 400;\">from network configurations to exposed credentials or known vulnerabilities.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is where<\/span> <a href=\"https:\/\/enthec.com\/en\/kartos\/\"><span style=\"font-weight: 400;\">Kartos,<\/span><\/a><span style=\"font-weight: 400;\">our specialized cyber-surveillance solution for organizations, comes into play. Kartos allows hospitals and health centers to have  <\/span><b>a clear and up-to-date view of their exposure to cyber threats,<\/b> <span style=\"font-weight: 400;\">analyzing their digital footprint in real time and alerting them of any possible risk before it is too late.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>The importance of continuous surveillance in the hospital environment<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">A hospital environment is much more than doctors, nurses, and patients. There are dozens of connected devices, from monitors to respirators, internal management systems, databases, emails, and mobile applications. Each of these elements can be a gateway if not adequately protected.  <\/span><\/p>\n<p><b>The continuous monitoring offered by Kartos acts as an early warning system.<\/b> <span style=\"font-weight: 400;\">It identifies vulnerabilities and tracks<\/span> <a href=\"https:\/\/enthec.com\/en\/keys-to-preventing-data-leaks\/\"><span style=\"font-weight: 400;\">information leaks,<\/span><\/a><span style=\"font-weight: 400;\">leaked passwords, possible domain impersonations, or suspicious network activities. It does so without installation since it works outside, analyzing the healthcare organization&#8217;s public exposure. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">This proactive approach does not replace other layers of defense (such as antivirus, firewalls, or access policies). Still, it complements them, providing a fundamental angle:<\/span><b> Know how attackers see you and act accordingly<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Thanks to this type of surveillance<\/span>, <b>Hospitals can make informed decisions in advance, <\/b><span style=\"font-weight: 400;\">instead of just reacting when it&#8217;s too late.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"size-full wp-image-3701 aligncenter\" src=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/05\/ciberseguridad-hospitales.jpg\" alt=\"Cybersecurity in hospitals\" width=\"650\" height=\"433\" srcset=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/05\/ciberseguridad-hospitales.jpg 650w, https:\/\/enthec.com\/wp-content\/uploads\/2025\/05\/ciberseguridad-hospitales-300x200.jpg 300w, https:\/\/enthec.com\/wp-content\/uploads\/2025\/05\/ciberseguridad-hospitales-350x233.jpg 350w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h3><b>And what about regulatory compliance?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In addition to protecting sensitive data<\/span>, <b>Cybersecurity in hospitals is also a legal issue.<\/b><span style=\"font-weight: 400;\">. Regulations such as the General Data Protection Regulation (GDPR) or the NIS2 Directive require healthcare organizations to implement protection measures and demonstrate that they have taken appropriate actions to prevent <\/span><a href=\"https:\/\/enthec.com\/en\/security-breach-what-it-is-types-and-how-to-find-it\/\"><span style=\"font-weight: 400;\">security breaches<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Solutions like Kartos are especially useful here. They allow hospitals to continuously record threat exposure and implement corrective actions, which enhances security and  <\/span><b>facilitates audits, inspections, and certification processes<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Cybersecurity in hospitals: defense against attacks, but also prevention<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">A good defense is not only based on building walls, but also on knowing where attackers can enter. In a healthcare environment, where people&#8217;s lives are at stake,  <\/span><b>prevention is as important as the response<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Adopting efficient solutions allows hospitals to<\/span> <b>act before a crisis occurs.<\/b><span style=\"font-weight: 400;\">. The best thing is that they do not require complex integrations or changing how IT teams work since the tool operates from the outside, with total autonomy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Enthec, a company specialized in cyber surveillance, offers technology and <\/span><b>strategic support <\/b>t<span style=\"font-weight: 400;\">o anticipate risks and maintain constant vigilance.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>The human and technological challenge<\/b><\/h2>\n<p><b>Awareness of healthcare personnel is also key.<\/b><span style=\"font-weight: 400;\">. Many security breaches begin with clicking on a malicious link or using a weak password. Therefore,  <\/span><a href=\"https:\/\/enthec.com\/en\/cybersecurity-solutions-that-you-should-apply-in-your-company\/\"><span style=\"font-weight: 400;\">cybersecurity solutions<\/span><\/a> <span style=\"font-weight: 400;\">must be part of the hospital culture, as hygiene or patient care are.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Kartos helps in that process by offering<\/span> <b>precise and actionable reports<\/b> <span style=\"font-weight: 400;\">that allow training internal teams, prioritizing efforts, and establishing more effective security policies.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Hospitals are places of care; we cannot allow digital threats to compromise operations.  <\/span><b>Cybersecurity in hospitals is neither a luxury nor a fashion but an urgent need<\/b> <span style=\"font-weight: 400;\">that must be addressed with modern tools, strategic vision, and constant commitment.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Kartos provides real-time vision that allows hospitals to anticipate problems and keep patient data where it should be:<\/span> <b>safe, secure, and available only to those who need it.<\/b><\/p>\n<p><b>Do you want to know how to better protect your hospital against digital threats?<\/b> <a href=\"https:\/\/enthec.com\/en\/contact\/\"><span style=\"font-weight: 400;\">Find out more about our Kartos solution<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Medical information is as valuable as it is sensitive. Hospitals and health centers, traditionally focused on caring for people&#8217;s physical [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":3704,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44],"tags":[24,32,33,61,62],"class_list":["post-3706","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-en","tag-cybersecurity","tag-kartos-en","tag-risks","tag-hospitals","tag-health"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u25b7 The challenge of Cybersecurity in Hospitals | Enthec<\/title>\n<meta name=\"description\" content=\"Cybersecurity in hospitals is key to protecting sensitive patient data \u2733\ufe0f Learn how to prevent attacks thanks to Enthec\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/enthec.com\/en\/cybersecurity-in-hospitals-how-continuous-monitoring-protects-sensitive-patient-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u25b7 The challenge of Cybersecurity in Hospitals | Enthec\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity in hospitals is key to protecting sensitive patient data \u2733\ufe0f Learn how to prevent attacks thanks to Enthec\" \/>\n<meta property=\"og:url\" content=\"https:\/\/enthec.com\/en\/cybersecurity-in-hospitals-how-continuous-monitoring-protects-sensitive-patient-data\/\" \/>\n<meta property=\"og:site_name\" content=\"ENTHEC \u00b7 Kartos \u00b7 Qondar\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-14T05:45:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/05\/hopitales-ciberseguros-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1703\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Enthec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Enthec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/enthec.com\/en\/cybersecurity-in-hospitals-how-continuous-monitoring-protects-sensitive-patient-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/en\/cybersecurity-in-hospitals-how-continuous-monitoring-protects-sensitive-patient-data\/\"},\"author\":{\"name\":\"Enthec\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\"},\"headline\":\"Cybersecurity in hospitals: How continuous monitoring protects sensitive patient data\",\"datePublished\":\"2025-05-14T05:45:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/cybersecurity-in-hospitals-how-continuous-monitoring-protects-sensitive-patient-data\/\"},\"wordCount\":864,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/cybersecurity-in-hospitals-how-continuous-monitoring-protects-sensitive-patient-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/05\/hopitales-ciberseguros-scaled.jpg\",\"keywords\":[\"Cybersecurity\",\"Kartos\",\"Risks\",\"Hospitals\",\"Health\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/enthec.com\/en\/cybersecurity-in-hospitals-how-continuous-monitoring-protects-sensitive-patient-data\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/enthec.com\/en\/cybersecurity-in-hospitals-how-continuous-monitoring-protects-sensitive-patient-data\/\",\"url\":\"https:\/\/enthec.com\/en\/cybersecurity-in-hospitals-how-continuous-monitoring-protects-sensitive-patient-data\/\",\"name\":\"\u25b7 The challenge of Cybersecurity in Hospitals | Enthec\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/cybersecurity-in-hospitals-how-continuous-monitoring-protects-sensitive-patient-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/cybersecurity-in-hospitals-how-continuous-monitoring-protects-sensitive-patient-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/05\/hopitales-ciberseguros-scaled.jpg\",\"datePublished\":\"2025-05-14T05:45:23+00:00\",\"description\":\"Cybersecurity in hospitals is key to protecting sensitive patient data \u2733\ufe0f Learn how to prevent attacks thanks to Enthec\",\"breadcrumb\":{\"@id\":\"https:\/\/enthec.com\/en\/cybersecurity-in-hospitals-how-continuous-monitoring-protects-sensitive-patient-data\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/enthec.com\/en\/cybersecurity-in-hospitals-how-continuous-monitoring-protects-sensitive-patient-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/en\/cybersecurity-in-hospitals-how-continuous-monitoring-protects-sensitive-patient-data\/#primaryimage\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/05\/hopitales-ciberseguros-scaled.jpg\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/05\/hopitales-ciberseguros-scaled.jpg\",\"width\":2560,\"height\":1703,\"caption\":\"Documents concept, Doctor use computer connection server data base patient for technology treatment in hospital.in Documents concept management\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/enthec.com\/en\/cybersecurity-in-hospitals-how-continuous-monitoring-protects-sensitive-patient-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/enthec.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity in hospitals: How continuous monitoring protects sensitive patient data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/enthec.com\/#website\",\"url\":\"https:\/\/enthec.com\/\",\"name\":\"ENTHEC\",\"description\":\"Advanced AI-driven Cyber-Surveillance Platform\",\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/enthec.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/enthec.com\/#organization\",\"name\":\"ENTHEC\",\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"url\":\"https:\/\/enthec.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"width\":667,\"height\":131,\"caption\":\"ENTHEC\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\",\"name\":\"Enthec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"caption\":\"Enthec\"},\"url\":\"https:\/\/enthec.com\/en\/author\/enthec\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u25b7 The challenge of Cybersecurity in Hospitals | Enthec","description":"Cybersecurity in hospitals is key to protecting sensitive patient data \u2733\ufe0f Learn how to prevent attacks thanks to Enthec","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/enthec.com\/en\/cybersecurity-in-hospitals-how-continuous-monitoring-protects-sensitive-patient-data\/","og_locale":"en_US","og_type":"article","og_title":"\u25b7 The challenge of Cybersecurity in Hospitals | Enthec","og_description":"Cybersecurity in hospitals is key to protecting sensitive patient data \u2733\ufe0f Learn how to prevent attacks thanks to Enthec","og_url":"https:\/\/enthec.com\/en\/cybersecurity-in-hospitals-how-continuous-monitoring-protects-sensitive-patient-data\/","og_site_name":"ENTHEC \u00b7 Kartos \u00b7 Qondar","article_published_time":"2025-05-14T05:45:23+00:00","og_image":[{"width":2560,"height":1703,"url":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/05\/hopitales-ciberseguros-scaled.jpg","type":"image\/jpeg"}],"author":"Enthec","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Enthec","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/enthec.com\/en\/cybersecurity-in-hospitals-how-continuous-monitoring-protects-sensitive-patient-data\/#article","isPartOf":{"@id":"https:\/\/enthec.com\/en\/cybersecurity-in-hospitals-how-continuous-monitoring-protects-sensitive-patient-data\/"},"author":{"name":"Enthec","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1"},"headline":"Cybersecurity in hospitals: How continuous monitoring protects sensitive patient data","datePublished":"2025-05-14T05:45:23+00:00","mainEntityOfPage":{"@id":"https:\/\/enthec.com\/en\/cybersecurity-in-hospitals-how-continuous-monitoring-protects-sensitive-patient-data\/"},"wordCount":864,"commentCount":0,"publisher":{"@id":"https:\/\/enthec.com\/#organization"},"image":{"@id":"https:\/\/enthec.com\/en\/cybersecurity-in-hospitals-how-continuous-monitoring-protects-sensitive-patient-data\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/05\/hopitales-ciberseguros-scaled.jpg","keywords":["Cybersecurity","Kartos","Risks","Hospitals","Health"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/enthec.com\/en\/cybersecurity-in-hospitals-how-continuous-monitoring-protects-sensitive-patient-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/enthec.com\/en\/cybersecurity-in-hospitals-how-continuous-monitoring-protects-sensitive-patient-data\/","url":"https:\/\/enthec.com\/en\/cybersecurity-in-hospitals-how-continuous-monitoring-protects-sensitive-patient-data\/","name":"\u25b7 The challenge of Cybersecurity in Hospitals | Enthec","isPartOf":{"@id":"https:\/\/enthec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/enthec.com\/en\/cybersecurity-in-hospitals-how-continuous-monitoring-protects-sensitive-patient-data\/#primaryimage"},"image":{"@id":"https:\/\/enthec.com\/en\/cybersecurity-in-hospitals-how-continuous-monitoring-protects-sensitive-patient-data\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/05\/hopitales-ciberseguros-scaled.jpg","datePublished":"2025-05-14T05:45:23+00:00","description":"Cybersecurity in hospitals is key to protecting sensitive patient data \u2733\ufe0f Learn how to prevent attacks thanks to Enthec","breadcrumb":{"@id":"https:\/\/enthec.com\/en\/cybersecurity-in-hospitals-how-continuous-monitoring-protects-sensitive-patient-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/enthec.com\/en\/cybersecurity-in-hospitals-how-continuous-monitoring-protects-sensitive-patient-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/en\/cybersecurity-in-hospitals-how-continuous-monitoring-protects-sensitive-patient-data\/#primaryimage","url":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/05\/hopitales-ciberseguros-scaled.jpg","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/05\/hopitales-ciberseguros-scaled.jpg","width":2560,"height":1703,"caption":"Documents concept, Doctor use computer connection server data base patient for technology treatment in hospital.in Documents concept management"},{"@type":"BreadcrumbList","@id":"https:\/\/enthec.com\/en\/cybersecurity-in-hospitals-how-continuous-monitoring-protects-sensitive-patient-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/enthec.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity in hospitals: How continuous monitoring protects sensitive patient data"}]},{"@type":"WebSite","@id":"https:\/\/enthec.com\/#website","url":"https:\/\/enthec.com\/","name":"ENTHEC","description":"Advanced AI-driven Cyber-Surveillance Platform","publisher":{"@id":"https:\/\/enthec.com\/#organization"},"alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/enthec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/enthec.com\/#organization","name":"ENTHEC","alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","url":"https:\/\/enthec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/","url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","width":667,"height":131,"caption":"ENTHEC"},"image":{"@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1","name":"Enthec","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","caption":"Enthec"},"url":"https:\/\/enthec.com\/en\/author\/enthec\/"}]}},"_links":{"self":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/3706","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/comments?post=3706"}],"version-history":[{"count":0,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/3706\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media\/3704"}],"wp:attachment":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media?parent=3706"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/categories?post=3706"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/tags?post=3706"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}